Kerberos

Results: 405



#Item
201Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
202Cyberwarfare / Key management / Kerberos / Key distribution center / Federated identity / Ticket Granting Ticket / Authentication / Ticket / OpenID / Computer network security / Cryptography / Computer security

Building a Better Grid Authentication System with Kerberos David McBride Department of Computing, Imperial College There are issues with GSI

Add to Reading List

Source URL: www.allhands.org.uk

Language: English - Date: 2010-04-07 12:01:06
203

Kerberos en environnement ISP UNIX/Win2K/Cisco > Nicolas FISCHBACH [removed] - http://www.securite.org/nico/ > Sébastien LACOSTE-SERIS

Add to Reading List

Source URL: www.securite.org

Language: French - Date: 2001-05-10 11:29:15
    204Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Ticket / Authentication protocol / Passwd / Authentication / Computer network security / Cryptography / Computer security

    Kerberos in an ISP environment UNIX/Win2K/Cisco > Nicolas FISCHBACH [removed] - http://www.securite.org/nico/ > Sébastien LACOSTE-SERIS

    Add to Reading List

    Source URL: www.securite.org

    Language: English - Date: 2001-05-10 11:35:55
    205Telehealth / Medicine / Medical informatics / Network architecture / DICOM / Lightweight Directory Access Protocol / Dynamic Host Configuration Protocol / Kerberos / Picture archiving and communication system / Medical imaging / Internet standards / Computing

    PS3.15 DICOM PS3.15 2015a - Security and System Management Profiles Page 2

    Add to Reading List

    Source URL: dicom.nema.org

    Language: English - Date: 2015-02-08 18:15:06
    206Key management / Cyberwarfare / Kerberos / Key distribution center / Single sign-on / Ticket Granting Ticket / Ticket / Authentication / Shared secret / Cryptography / Computer network security / Computer security

    Cross-realm Kerberos implementations Esan Wit Esan.Wit at os3.nl Mick Pouw Mick.Pouw at os3.nl

    Add to Reading List

    Source URL: realm-xover.arpa2.net

    Language: English - Date: 2014-10-11 16:09:30
    207Cryptography / Challenge-response authentication / Password / Oracle Database / Computer network security / Internet protocols / Kerberos / Password authentication protocol / Cryptographic protocols / Computing / Data

    Oracle authentication László Tóth [removed] Disclaimer

    Add to Reading List

    Source URL: soonerorlater.hu

    Language: English - Date: 2010-03-21 10:35:17
    208Computing / Internet / Technology / Security token / Kerberos / Password / Transaction authentication number / Email

    BankLink Secure Client Order Form

    Add to Reading List

    Source URL: www.banklink.com.au

    Language: English - Date: 2014-06-24 17:50:18
    209Data / Internet standards / Network file systems / Directory services / Inter-process communication / Server Message Block / Microsoft Open Specification Promise / Kerberos / Network File System / Computing / Internet protocols / Network architecture

    [MS-DTYP]: Windows Data Types Intellectual Property Rights Notice for Open Specifications Documentation  Technical Documentation. Microsoft publishes Open Specifications documentation for

    Add to Reading List

    Source URL: download.microsoft.com

    Language: English - Date: 2014-05-02 10:54:11
    210Ciphertext / Known-plaintext attack / Cryptographic protocols / RSA / Weak key / Kerberos / Initialization vector / Challenge-response authentication / Cryptography / Public-key cryptography / Password

    © ACM, 1989. This is the authorsʼ version of the work, posted by permission of ACM. http://doi.acm.org[removed]74853 Reducing Risks from Poorly Chosen Keys T. Mark A. Lomas, Li Gong, Jerome H. Saltzery, Roger M.

    Add to Reading List

    Source URL: web.mit.edu

    Language: English - Date: 2011-05-18 00:06:38
    UPDATE